adplus-dvertising
frame-decoration

Question

The final form of the 802.11i standard is referred to as –

a.

Wi-Fi Protected Access

b.

Robust Security Network

c.

Wired Equivalency Privacy

d.

None of the mentioned

Answer: (b).Robust Security Network

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The final form of the 802.11i standard is referred to as –

Similar Questions

Discover Related MCQs

Q. What is the size of the Temporal Key for the case of TKIP?

Q. What is a valid size of the Group Temporal Key (GTK) in WEP?

Q. Which key in the PTK protects the confidentiality of keys and data during RSN associated procedure?

Q. What is the size of the Message Integrity Code Key?

Q. Which one of these is not a Traffic control key?

Q. The MPDU exchange for distributing pairwise keys is known as __________

Q. GTK is encrypted using:

Q. Message Integrity Code (MIC) is generated by an algorithm called

Q. The TKIP and CCMP both provide 3 services: Message Integrity, Data Confidentiality and Protected Data Transfer.

Q. CCMP uses which block cipher mode of operation?

Q. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.

Q. HMAC SHA-1 produces a hash of length-

Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression –

nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)

What is the value of the ‘Len’ (desirable number of pseudorandom bits)?

Q. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)

What is the Key ‘K’ in the above expression?

Q. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?

Q. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input –

Q. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

Q. The Pairwise master key (PMK) can be derived from either PSK or MSK.

Q. The pairwise transient key (PTK) is derived from –

Q. The pairwise transient key (PTK) consists of ______________ keys.